A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Common misconfigurations that lead to a breach - (BSides Boston 2015) (Hacking Illustrated Series InfoSec Tutorial Videos)

Common misconfigurations that lead to a breach

Justin Tharpe

BSides Boston 2015

I would like to do a talk about different misconfiguration I have seen over the years as a Network Engineer that lead to vulnerabilities. I will use sanitized examples of configurations that I have seen and would consider "common". I will then have demos of how those misconfiguration can lead to compromise of your network.

Bio: Justin Tharpe OSCP - I am a Network Engineer by day and security enthusiast at night. I have been implementing and supporting systems for 9+ years. I have seen a lot of things misconfigured in the wild that could very easily lead to a breach. I want to use this experience and these examples to help educate people to better understand why these configurations are a bad idea by providing examples of how to execute these attacks. I have a blog I run with two others that focuses on infosec. We produce vulnerable VM's for www.vulnhub.com we also have a CTF team, and we are starting to provide free infosec training to the community.

Back to BSides Boston 2015 list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast